diff options
author | Robert Göhler <github@ghlr.de> | 2024-06-18 21:36:11 +0200 |
---|---|---|
committer | GitHub <noreply@github.com> | 2024-06-18 21:36:11 +0200 |
commit | 6c1bf9201acd7684397bbcccc3b756107bb8b98b (patch) | |
tree | a58d1ca4a3bd39c2d0e16f3b336864c6a0374244 /docs/configuration/firewall/ipv4.rst | |
parent | 5a5c8fd3056cc0a012da204f511eb50aa403e526 (diff) | |
parent | 47f1ff461a096853ffbbd15b2554c9c289f03607 (diff) | |
download | vyos-documentation-6c1bf9201acd7684397bbcccc3b756107bb8b98b.tar.gz vyos-documentation-6c1bf9201acd7684397bbcccc3b756107bb8b98b.zip |
Merge pull request #1485 from vyos/mergify/bp/sagitta/pr-1482
Configuration Blueprints: add new example for firewall+vrf. (backport #1482)
Diffstat (limited to 'docs/configuration/firewall/ipv4.rst')
-rw-r--r-- | docs/configuration/firewall/ipv4.rst | 8 |
1 files changed, 8 insertions, 0 deletions
diff --git a/docs/configuration/firewall/ipv4.rst b/docs/configuration/firewall/ipv4.rst index d425b41f..2a654fd7 100644 --- a/docs/configuration/firewall/ipv4.rst +++ b/docs/configuration/firewall/ipv4.rst @@ -686,6 +686,10 @@ geoip) to keep database and rules updated. For example: ``eth2*``. Prepending character ``!`` for inverted matching criteria is also supportd. For example ``!eth2`` +.. note:: If an interface is attached to a non-default vrf, when using + **inbound-interface**, vrf name must be used. For example ``set firewall + ipv4 forward filter rule 10 inbound-interface name MGMT`` + .. cfgcmd:: set firewall ipv4 forward filter rule <1-999999> inbound-interface group <iface_group> .. cfgcmd:: set firewall ipv4 input filter rule <1-999999> @@ -707,6 +711,10 @@ geoip) to keep database and rules updated. For example: ``eth2*``. Prepending character ``!`` for inverted matching criteria is also supportd. For example ``!eth2`` +.. note:: If an interface is attached to a non-default vrf, when using + **outbound-interface**, real interface name must be used. For example + ``set firewall ipv4 forward filter rule 10 outbound-interface name eth0`` + .. cfgcmd:: set firewall ipv4 forward filter rule <1-999999> outbound-interface group <iface_group> .. cfgcmd:: set firewall ipv4 output filter rule <1-999999> |